Weighted Feature Selection Techniques for Detecting Impersonation Attack in Wi-Fi Networks
نویسندگان
چکیده
As Internet-of-Things (IoT) devices enable pervasive computing in our daily lives, more and more devices are connected to Wi-Fi networks. The public access to Wi-Fi network leads to exploitable vulnerabilities that can be inverted as attacks. Impersonation attack is an active malicious action where unauthorized users masquerade themself as authorized to gain privileges. Detecting impersonation attacks remains a challenging task due to its similar properties with benign packets. Moreover, the pervasiveness of IoT devices connected to a Wi-Fi network generates a complex, largescale, and high-dimensional data, which leads to difficulties in real-time detection and mitigation. Selecting the best features is one of the challenging issues to improve the performance of the classifier. In this study, we examine the feature weighting methods of existing machine learners and how they could be used for the accurate selection for impersonation attack features. We test and validate the utility and usefulness of the selected features using a standard neural network. This study finally demonstrates that the proposed weight-based machine learning model can outperform other filterbased feature selection models. We evaluated the proposed model on a well-referenced Wi-Fi networks benchmark dataset, namely, AWID. The experimental results not only demonstrate the effectiveness of the proposed model achieving an accuracy of 99.86% but also prove that combining a weightbased feature selection method with a light machine-learning classifier leads to a significantly better performance compared to the best result reported in the literature.
منابع مشابه
Improving Detection of Wi-Fi Impersonation by Fully Unsupervised Deep Learning
Intrusion Detection System (IDS) has been becoming a vital measure in any networks, especially Wi-Fi networks. Wi-Fi networks growth is undeniable due to a huge amount of tiny devices connected via Wi-Fi networks. Regrettably, adversaries may take advantage by launching an impersonation attack, a common wireless network attack. Any IDS usually depends on classification capabilities of machine l...
متن کاملDetecting Impersonation Attack in WiFi Networks Using Deep Learning Approach
WiFi network traffics will be expected to increase sharply in the coming years, since WiFi network is commonly used for local area connectivity. Unfortunately, there are difficulties in WiFi network research beforehand, since there is no common dataset between researchers on this area. Recently, AWID dataset was published as a comprehensive WiFi network dataset, which derived from real WiFi tra...
متن کاملA survey on the wi-fi wireless network systems penetration approaches
Wireless network technology made it possible to communicate easily using the electromagnetic waves leading to removing the biggest barrier in portable communications. As these networks use the air as the communication medium which leads to face with more vulnerabilities. Wireless networks play a vital role in our life in a way that all devices ranging from local modems to organizational equipme...
متن کاملAn Indoor Positioning System Based on Wi-Fi for Energy Management in Smart Buildings
To offer indoor services to occupants in the context of smart buildings, it is necessary to consider information concerning to the identity and location of the occupants. This paper proposes an indoor positioning system (IPS) based on Wi-Fi fingerprint and K-nearest neighbors (KNN) method. The positioning of a mobile device (MD) using Wi-Fi technology involves online and offline phases. In this...
متن کاملWi-Trust : Computational Trust and Reputation Management for Stronger Hotspot 2.0 Security
In its list of top ten smartphone risks, the European Union Agency for Network and Information Security ranks network spoofing attacks as number 6. In this paper, we present how we have validated different computational trust and reputation management techniques by means of implemented prototypes in real devices to mitigate malicious legacy Wi-Fi hotspots including spoofing attacks. Then we exp...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2016